hit counter script

Cisco 300 Series Administration Manual page 393

Managed switch
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

18
STEP 4
802.1X
356
-
Secure Permanent—Keeps the current dynamic MAC addresses
associated with the port and learns up to the maximum number of
addresses allowed on the port (set by Max No. of Addresses Allowed).
Relearning and aging are enabled.
-
Secure Delete on Reset—Deletes the current dynamic MAC addresses
associated with the port after reset. New MAC addresses can be learned
as Delete-On-Reset ones up to the maximum addresses allowed on the
port. Relearning and aging are disabled.
Max No. of Addresses Allowed—Enter the maximum number of MAC
addresses that can be learned on the port if Limited Dynamic Lock learning
mode is selected. The number 0 indicates that only static addresses are
supported on the interface.
Action on Violation—Select an action to be applied to packets arriving on a
locked port. The options are:
-
Discard—Discards packets from any unlearned source.
-
Forward—Forwards packets from an unknown source without learning
the MAC address.
-
Shutdown—Discards packets from any unlearned source, and shuts
down the port. The port remains shut down until reactivated, or until the
device is rebooted.
Trap—Select to enable traps when a packet is received on a locked port.
This is relevant for lock violations. For Classic Lock, this is any new address
received. For Limited Dynamic Lock, this is any new address that exceeds
the number of allowed addresses.
Trap Frequency—Enter minimum time (in seconds) that elapses between
traps.
Click Apply. Port security is modified, and the Running Configuration file is
updated.
See the
Security: 802.1X Authentication
authentication. This includes MAC-based and web-based authentication.
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
chapter for information about 802. 1 X
Security
802. 1 X

Advertisement

Table of Contents
loading

Table of Contents